HomeSort by relevance Sort by last modified time
    Searched full:cryptohome (Results 1 - 25 of 90) sorted by null

1 2 3 4

  /external/autotest/client/site_tests/platform_CryptohomeTestAuth/
platform_CryptohomeTestAuth.py 12 from autotest_lib.client.cros import constants, cryptohome
22 user_hash = cryptohome.get_user_hash(test_user)
26 cryptohome.unmount_vault(test_user)
27 cryptohome.remove_vault(test_user)
33 cryptohome.mount_vault(test_user, test_password, create=True)
36 if not cryptohome.test_auth(test_user, test_password):
41 if cryptohome.test_auth(test_user, 'badpass'):
46 cryptohome.unmount_vault(test_user)
48 if cryptohome.is_vault_mounted(user=test_user, allow_fail=True):
49 raise error.TestFail('Cryptohome did not unmount the user.'
    [all...]
control 7 PURPOSE = "Verify that cryptohome can verify credentials."
8 CRITERIA = "This test will fail if cryptohome fails to validate credentials."
17 This test checks that cryptohome can verify credentials.
  /external/autotest/client/site_tests/platform_CryptohomeKeyEviction/
platform_CryptohomeKeyEviction.py 7 from autotest_lib.client.cros import cryptohome, pkcs11
10 """Ensure that the cryptohome properly manages key eviction from the tpm.
12 and then remounting a user's cryptohome. Mount requires use of the
13 user's cryptohome key, and thus the mount only succeeds if the
14 cryptohome key was properly evicted and reloaded into the TPM.
21 self._cryptohome_proxy = cryptohome.CryptohomeProxy()
29 # First we inject 30 tokens into chaps. This forces the cryptohome
34 # Then we get a user to remount his cryptohome. This process uses
35 # the cryptohome key, and if the user was able to login, the
36 # cryptohome key was correctly reloaded
    [all...]
control 17 Ensure that the cryptohome properly manages key eviction from
19 chaps, and then remounting a user's cryptohome. Mount requires use of the
20 user's cryptohome key, and thus the mount only succeeds if the
21 cryptohome key was properly evicted and reloaded into the TPM.
  /external/autotest/client/site_tests/login_Cryptohome/
login_Cryptohome.py 10 from autotest_lib.client.cros import cryptohome
16 """Verify the cryptohome is mounted only after login."""
24 if not cryptohome.is_vault_mounted(user=username,
28 if cryptohome.is_vault_mounted(user=username,
35 cryptohome.remove_vault(username)
37 cryptohome.mount_vault(TEST_USER, TEST_PASS, create=True)
38 test_file = os.path.join(cryptohome.user_path(TEST_USER), 'hello')
40 cryptohome.unmount_vault(TEST_USER)
43 if not cryptohome.is_vault_mounted(user=username,
control 7 PURPOSE = "Verify the cryptohome is mounted only after login."
9 This test will fail if cryptohome is mounted when not logged in, or vice versa.
20 This test checks that a cryptohome was mounted only after logging in.
  /external/cros/system_api/
system_api.pc 4 Libs: -lsystem_api-power_manager-protos -lsystem_api-cryptohome-protos -lsystem_api-protos
system_api.gyp 62 'target_name': 'system_api-cryptohome-protos-gen',
65 'proto_in_dir': 'dbus/cryptohome',
66 'proto_out_dir': 'include/cryptohome/proto_bindings',
76 'target_name': 'system_api-cryptohome-protos',
80 'system_api-cryptohome-protos-gen',
83 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/key.pb.cc',
84 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/rpc.pb.cc',
85 '<(SHARED_INTERMEDIATE_DIR)/include/cryptohome/proto_bindings/signed_secret.pb.cc',
  /external/autotest/client/site_tests/platform_CryptohomeMount/
platform_CryptohomeMount.py 7 from autotest_lib.client.cros import cryptohome
10 """Validates basic cryptohome creation and mounting."""
18 user_hash = cryptohome.get_user_hash(test_user)
19 proxy = cryptohome.CryptohomeProxy()
34 raise error.TestFail('Cryptohome mounted after unmount!')
39 raise error.TestFail('Cryptohome mounted with a bad password.')
42 raise error.TestFail('Cryptohome mounted even though mount() failed')
46 raise error.TestFail('Cryptohome could not clean up vault')
control 16 This test checks that cryptohome can create and mount an encrypted vault.
  /external/cros/system_api/constants/
cryptohome.h 10 namespace cryptohome { namespace
15 } // namespace cryptohome
  /external/autotest/client/site_tests/platform_CryptohomeSyncStress/
platform_CryptohomeSyncStress.py 18 # make sure cryptohome is mounted
20 proxy = bus.get_object('org.chromium.Cryptohome',
21 '/org/chromium/Cryptohome')
22 cryptohome = dbus.Interface(proxy, 'org.chromium.CryptohomeInterface')
24 ismounted = cryptohome.IsMounted()
26 raise error.TestFail('Cryptohome failed to mount.')
  /external/autotest/client/site_tests/platform_CryptohomeTPMReOwn/
platform_CryptohomeTPMReOwn.py 10 Test of cryptohome functionality to re-create a user's vault directory if
35 output = self.__run_cmd("/usr/sbin/cryptohome --action=remove " +
39 output = self.__run_cmd("/usr/sbin/cryptohome " +
49 output = self.__run_cmd("/usr/sbin/cryptohome --action=mount" +
53 error_msg = "Cryptohome mount failed"
58 output = self.__run_cmd("/usr/sbin/cryptohome --action=unmount")
59 output = self.__run_cmd("/usr/sbin/cryptohome " +
62 error_msg = 'Cryptohome did not create a TPM-wrapped keyset.'
69 output = self.__run_cmd("/usr/sbin/cryptohome " +
79 output = self.__run_cmd("/usr/sbin/cryptohome --action=mount"
    [all...]
  /external/autotest/client/site_tests/platform_Attestation/
platform_Attestation.py 7 from autotest_lib.client.cros import cryptohome
14 utils.system(cryptohome.CRYPTOHOME_CMD +
22 utils.system(cryptohome.CRYPTOHOME_CMD +
27 utils.system(cryptohome.CRYPTOHOME_CMD +
34 utils.system(cryptohome.CRYPTOHOME_CMD +
40 status = cryptohome.get_tpm_attestation_status()
44 status = cryptohome.get_tpm_attestation_status()
  /external/autotest/client/site_tests/platform_CryptohomeChangePassword/
platform_CryptohomeChangePassword.py 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user='
32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user='
37 raise error.TestFail('Cryptohome could not remove the test user.')
40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user
45 raise error.TestFail('Cryptohome could not create the test user.')
47 cmd = ('/usr/sbin/cryptohome --action=is_mounted')
49 raise error.TestFail('Cryptohome created the user but did not mount.')
52 cmd = ('/usr/sbin/cryptohome --action=unmount')
55 cmd = ('/usr/sbin/cryptohome --action=is_mounted')
57 raise error.TestFail('Cryptohome did not unmount the user.'
    [all...]
control 7 PURPOSE = "Verify that cryptohome can change a password for an ecrypted vault."
8 CRITERIA = "This test will fail if cryptohome fails to re-wrap the vault key with the new password."
17 This test checks that cryptohome can change a password for an encrypted vault.
  /external/autotest/client/site_tests/platform_BootLockbox/
platform_BootLockbox.py 9 from autotest_lib.client.cros import cryptohome
36 status = cryptohome.get_tpm_status()
40 cryptohome.take_tpm_ownership()
41 status = cryptohome.get_tpm_status()
46 return utils.system(cryptohome.CRYPTOHOME_CMD +
51 return utils.system(cryptohome.CRYPTOHOME_CMD +
56 utils.system(cryptohome.CRYPTOHOME_CMD + ' --action=finalize_lockbox')
59 return utils.system(cryptohome.CRYPTOHOME_CMD +
64 utils.system(cryptohome.CRYPTOHOME_CMD +
68 return utils.system(cryptohome.CRYPTOHOME_CMD
    [all...]
  /external/autotest/client/site_tests/login_CryptohomeIncognito/
login_CryptohomeIncognito.py 10 from autotest_lib.client.cros import cryptohome
18 if not cryptohome.is_guest_vault_mounted():
22 if cryptohome.is_guest_vault_mounted(allow_fail=True):
  /external/autotest/client/site_tests/platform_CryptohomeBadPerms/
control 7 PURPOSE = "Tests Cryptohome's protection against bad directory permissions."
14 Tests Cryptohome's ability to detect directories with bad permissions or
platform_CryptohomeBadPerms.py 9 from autotest_lib.client.cros import cryptohome
20 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
24 path = cryptohome.user_path(user)
34 path = cryptohome.system_path(user)
45 path = cryptohome.user_path(user)
56 path = cryptohome.user_path(user)
66 path = cryptohome.user_path(user)
  /external/autotest/client/site_tests/platform_CryptohomeNonDirs/
control 7 PURPOSE = "Tests Cryptohome's protection against non-directory mounts."
14 Tests whether cryptohome correctly returns errors when non-directory components
platform_CryptohomeNonDirs.py 9 from autotest_lib.client.cros import cryptohome
31 self.cryptohome_proxy = cryptohome.CryptohomeProxy()
35 path = cryptohome.user_path(user)
44 path = cryptohome.system_path(user)
53 path = cryptohome.user_path(user)
66 path = cryptohome.system_path(user)
  /external/autotest/server/site_tests/platform_CryptohomeTPMReOwnServer/
control 13 This test verifies that cryptohome re-creates a user's cryptohome directory
  /external/autotest/client/site_tests/login_CryptohomeOwnerQuery/
login_CryptohomeOwnerQuery.py 14 from autotest_lib.client.cros import cros_ui, cryptohome, ownership
17 """Verify that the cryptohome owner user query works properly."""
32 self._cryptohome_proxy = cryptohome.CryptohomeProxy(bus_loop)
38 if cryptohome.get_login_status()['owner_user_exists']:
47 if not cryptohome.get_login_status()['owner_user_exists']:
  /external/autotest/client/site_tests/platform_CryptohomeFio/
platform_CryptohomeFio.py 8 from autotest_lib.client.cros import cryptohome
47 # Mount a test cryptohome vault.
49 cryptohome.mount_vault(TEST_USER, TEST_PASSWORD,
51 tmpdir = cryptohome.user_path(TEST_USER)
75 cryptohome.unmount_vault(TEST_USER)
76 cryptohome.remove_vault(TEST_USER)

Completed in 412 milliseconds

1 2 3 4